/Dark-Phish

A Powerful Phishing Tool with 50+ phishing templates. For more about Dark-Phish tool please visit the website.

Primary LanguagePythonGNU General Public License v3.0GPL-3.0

Dark-Phish

Empowering Ethical Phishing for Security Assessment.

Dark-Phish Logo

Dark-Phish v2.2

Dark-Phish Logo

Dark-Phish is a specialized phishing tool created for educational and security testing purposes. It provides users with the capability to simulate phishing attacks, enabling the assessment of system vulnerabilities and user awareness.

Demo on REPLIT

Click here to view the demo on Replit

Features

  • Multiple Tunneling Options: Choose from various methods for flexible phishing simulation.
  • Auto-saved Credentials: Victim credentials are stored automatically.
  • Credential Management: Easily access and manage saved credentials.
  • Custom Phishing Templates: Create customized and convincing phishing scenarios.
  • OTP Capture: Efficiently collect one-time passwords for improved assessment capabilities.
  • URL Obfuscation: Dark-Phish conceals phishing URLs, making them appear trustworthy and less suspicious.
Tested on
  • Kali Linux
  • Termux
Installation
apt install python3 curl php git openssh nodejs npm -y
bash install.sh
pip3 install requests wget pyshorteners
git clone https://github.com/tucommenceapousser/Dark-Phish.git
cd Dark-Phish
Usage

*Before using Dark-Phish, ensure you have the necessary packages installed as mentioned in the installation section.*

  • Run Dark-Phish
python3 dark-phish.py
  • For help and usage information
python3 dark-phish.py -h
  • To access saved credentials
python3 dark-phish.py -r
Help
python3 dark-phish.py -h

Name:
    Dark-Phish

Usage:
    python3 dark-phish.py [-h] [-p PORT] [-u] [-v] [-r]

Version:
    2.2

Options:
    -h,  --help                     Show this help message.
    -p PORT,  --port PORT           Web server port [Default : 8080].
    -u,  --update                   Check for updates.
    -v,  --version                  Show version number and exit.
    -r,  --retrieve                 Retrieve saved credentials.
Modes modded by trhacknon and custom
  • custom
  • customx (fun style customizable)
  • facebookk
  • telegram (otp)
OTP Capture Technique
  1. When a victim enters their credentials on the phishing page, the attacker immediately receives this information.
  2. The attacker, using the victim's credentials, logs into the legitimate website.
  3. The genuine website sends an actual OTP to the victim.
  4. Believing it's legitimate, the victim enters the OTP on the phishing page.
  5. The attacker intercepts the OTP, gaining access to the victim's credentials and logging in first.
Available tunnels
  1. Localhost
  2. Ngrok
  3. Cloudflared
  4. LocalXpose
  5. Serveo
  6. Localtunnel

Dark-Phish

Image 1 Image 2

Thanks to TheLinuxChoice for the good base and to Trhacknon for have modz a little some details

Disclaimer

Dark-Phish is intended for educational and testing purposes only. Any use of this tool for illegal or unethical activities is strictly prohibited. The authors and contributors are not responsible for any misuse or damage caused by Dark-Phish. Use it responsibly and ensure compliance with all applicable laws and regulations in your jurisdiction.